No.
|
Title
|
Authors
|
Paper File
|
Present File
|
1
|
Preface,
Organization Committee, . . .
|
|
Download
|
|
2
|
Trust
Modeling and Verification Using Colored
Petri Nets
|
Amir Jalali Bidgoli
Behrouz
Tork Ladani
|
Download
|
Download
|
3
|
RTBIMS:
Accuracy Enhancement in Iterative
Multiplication Strategy for Computing Propagated Trust
|
Hassan Shakeri
Abbas
Ghaemi Bafghi
|
Download
|
Download
|
4
|
Computing
Trust Resultant using Intervals
|
Hassan Shakeri
Abbas
Ghaemi Bafghi
Hadi
Sadoghi Yazdi
|
Download
|
Download
|
5
|
Hybrid
Rule Threshold Adjustment System for Intrusion Detection
|
Mohammad Mahdi Moghimi
Mohammad
Saraee
|
Download
|
Download
|
6
|
Security Analyzing and Designing GUI with the Resources Model
|
Maryam Mehrnejad
Ehsan
Toreini
Abbas
Ghaemi Bafghi
|
Download
|
Download
|
7
|
On the
Period of GSM’s A5/1 Stream Cipher and Its
Internal State Transition Structure
|
Vahid Amin Ghaffari
Ali
Vardasbi
|
Download
|
Download
|
8
|
An
Improved Attack on A5/1
|
Vahid Amin Ghafari
Javad
Mohajeri
|
Download
|
Download
|
9
|
An Entanglement-based Quantum Key Distribution Protocol
|
Monireh Houshmand
Saied
Hosseini-khayat
|
Download
|
Download
|
10
|
Cryptanalysis
and Improvement on a New RFID Mutual Authentication
Protocol Compatible with EPC Standard
|
Mohammad Hassan Habibi
Mahmud
Gardeshi
|
Download
|
Download
|
11
|
Multiple-Chi-square Tests and Their Application on Distinguishing Attacks
|
Ali Vardasbi
Mahmoud
Salmasizadeh
Javad
Mohajeri
|
Download
|
Download
|
12
|
A
Secure and Robust Video Watermarking Based
on Chaotic Maps
|
Somayyeh Mohammadi
Siamak
Talebi
Ahmad
Hakimi
|
Download
|
Download
|
13
|
Watermarking
in Farsi/Arabic binary document images using fractal
coding
|
Fatemeh Daraee
Saeed
Mozaffari
|
Download
|
Download
|
14
|
An
efficient buyer-seller watermarking
protocol based on proxy signatures
|
Mohammad KazemNasab Haji
Ziba
Eslami
|
Download
|
Download
|
15
|
A
Reversible Data Embedding Scheme Based on Search
Order Coding for VQ Index Tables
|
Peyman Rahmani
Gholamhossein
Dastghaibyfard
Ehsan
Rahmani
|
Download
|
Download
|
16
|
Cryptographic Keys Management for H.264 Scalable Coded Video
Security
|
Mamoona Asghar
Mohammed
Ghanbari
|
Download
|
Download
|